Amazon 1

Tuesday, April 28, 2009

Designed as a luxurious tourist resort in Northern Taiwan, the futuristic town of San Zhi was abandoned before it was even completed. Stories say that many workers died while working on the pod-houses and the government decided to pull the plug on the project. So now, instead of an expensive tourist destination for the richest people in Taiwan, San Zhi is just a ghost town left at the mercy of the elements.

Locals say San Zhi is now haunted by the ghosts of those who died here during construction.

Pripyat

The city of Pripyat was the home of Chernobyl workers before the terrible nuclear accident but after 1986 it was completely deserted. Because the residents were not allowed to take anything but a suitcase of uncontaminated clothes when Pripyat was evacuated, it had the look of a quiet museum. But that all changed when authorities announced that the area was relatively safe, that’s when scavengers made their appearance, taking even the toilet-seats from some apartments.

Although access to the city is not completely restricted, I don’t know why anyone would want to visit such a spooky location where there are still some traces of radiation.

Hashima Island

Also known as Gunkanjima or Battleship Island because of its shape, Hashima is one of many deserted islands on the Japanese coast. In 1890 a coal-mining company started building facilities here and the island was surrounded by a tall concrete wall to protect it from hurricanes. At one point Hashima had one of the highest population densities in history, but as petroleum began to replace coal, in 1974 the facilities were shut-down and the population evacuated. Access to Hashima Island has been restricted ever since it was abandoned and rumors say it is haunted.

Bodie, USA

Bodie

Once a flourishing gold-mining town with a population of nearly 10,000 souls, Bodie is now a decaying ghost town left at the mercy of the elements. Founded in 1859 as a mining camp by gold prospector W. Bodye, the town attracted gold diggers from all over the world but because it had little groundwater resources it was deserted at the beginning of the 20th century.

Bodie is recognized as a National Historic Landmark and the remaining houses have been preserved with their original interiors.

Centralia

Centralia was never a large town, at its peak it only had about 2,000 residents out of which just 18 remain today. The downfall of this American borough started in 1962 when the authorities ignited a town landfill that was atop an unsealed coal mine. The coal started burning underground causing damage and endangering the lives of locals.

Centralia was literally sitting on a powder keg and when gas stations started registering high temperatures in their fuel tanks the authorities decided to evacuate the town. The underground fire still burns and scientists say it could be burning for another 250 years.

Saturday, April 25, 2009

The ancient Great Wall of China is almost 200 miles longer than previously thought, according to a new study.

An extra 180 miles of the world-renowned ancient Chinese monument were uncovered after a two-year government mapping study, according to an official report.

The study used mapping technologies such as infrared range finders and GPS devices to show extra portions of the wall - hidden by hills, trenches and rivers - that stretch from Hu Mountain in northern Liaoning province to Jiayu Pass in western Gansu province.

The newly mapped parts of the wall were built during the Ming Dynasy to protect against northern invaders.

They were covered over time by sandstorms that moved across the arid region.

The newly found parts mean the Great Wall - which Chinese emperors began building 2,000 years ago to keep out Mongols and invaders - spans about 3,900 miles through the northern part of the country.

The project is to continue for another year to try to map sections of the wall built during the Qin and Han Dynasties.Key Chinese Dynasties

Ming 1368AD - 1644AD

Qin 221BC - 206BC

Han 206BC - 9AD

Recent studies by Chinese archaeologists show that sections of the wall in Gansu are being reduced to "mounds of dirt" by sandstorms and may disappear entirely in 20 years.

They blame destructive farming methods in the 1950s that "desertified" large areas of northern China.

Also, portions of the wall in Gansu were made of packed earth, much less resilient than the brick and stone used in much of the wall's construction.

China has in recent years begun restoring parts of the wall as well as trying to rein in commercial development on and around it.

The wall's modern sections around the Chinese capital date from the Ming Dynasty, including those restored since the Communist Party took power in 1949, and several areas - including the most popular, Badaling, just north of Beijing - draw hundreds of thousands of visitors each year.

Tourist encroachment also has been a problem in recent years, with state media saying that, near Badaling, almost every brick on a popular section of the wall has been carved with people's names or other graffiti.

It is well known that China has an ancient and glorious history, from the feudal periods ending in 222 BC through the three Imperial and Intermediate Eras, up to the Modern era – over 4000 years of dynastic reigns. It may also be well known that China is the source of many wonderful and useful inventions from spaghetti to gunpowder. This list, however, will take a slightly different slant of the topic: Chinese inventions and developments that were not known to or adopted by the Western (European) world for many decades and sometimes centuries after they were common place in China. Some you may be familiar with, others perhaps less so.

As this is not a ‘top 10’ type list, the entries are in a (mostly) chronological order of when they were invented or developed. Please note that these are inventions and technological developments and not discoveries about the natural world - though it is also true that in many cases the Chinese scientists far preceded ‘The West’ in discoveries as well (e.g. William Harvey is credited with discovering the circulation of blood in 1628. It was described in Chinese documents in the 2nd Century BC).1Row PlantingFeudal Period – 6 Century BC

The Chinese started planting crops in rows sometime in the 6th century BC. This technique allows the crops to grow faster and stronger. It facilitates more efficient planting, watering, weeding and harvesting. There is also documentation that they realized that as the wind travels over rows of plants there is less damage. This obvious development was not instituted in the western world for another 2200 years. Master Lu wrote in the “Spring and Autumn Annals”: ‘If the crops are grown in rows they will mature rapidly because they will not interfere with each other’s growth. The horizontal rows must be well drawn, the vertical rows made with skill, for if the lines are straight the wind will pass gently through.’ This text was compiled around 240 BC.2CompassFeudal period – 4th Cent BC

2

The Chinese developed a lodestone compass to indicate direction sometime in the 4th century BC. These compasses were south pointing and were primarily used on land as divination tools and direct finders. Written in the 4th Century BC, in the Book of the Devil Valley Master it is written: “lodestone makes iron come or it attracts it”. The spoons were made from lodestone, while the plates were of bronze. Thermo-remanence needles were being produced for mariners by the year 1040, with common use recorded by 1119. Thermo-remanence technology, still in use today, was ‘discovered’ by William Gilbert in about 1600.3The Seed DrillHan Dynasty: circa 202 BC – 220 AD

3

The Seed Drill is used to plant seeds into the soil at a uniform depth and covers it. Without this tool seeds are tossed by hand over the ground resulting in waste and inefficient, uneven growth. Chinese farmers were using seed drills as early as the 2nd Century BC. The first known European instance was a patent issued to Camillo Torello in 1566, but was not adopted by Europeans into general use until the mid 1800’s.4.Iron PlowsHan Dynasty: circa 202 BC – 220 AD

One of the major developments of the ancient Chinese agriculture was the use of the iron moldboard plows. Though probably first developed in the 4th century BC and promoted by the central government, they were popular and common by the Han Dynasty. (So I am using the more conservative date). A major invention was the adjustable strut which, by altering the distance of the blade and the beam, could precisely set the depth of the plow. This technology was not instituted into England and Holland until the 17th century, sparking an abundance of food which some experts say was a necessary prerequisite for the industrial revolution.

5Deep DrillingHan Dynasty: circa 202 BC – 220 AD

By the first century BC the Chinese had developed the technology for deep drilling boreholes. Some of these reached depths of 4800 feet (about 1.5 km). They used technology that would be easily recognizable to a modern engineer and lay person alike. Derricks would rise as much as 180 feet above the borehole. They stacked rocks with center holes (tube or doughnut shaped) from the surface to the deep stone layer as a guide for their drills (similar to today’s guide tubes). With hemp ropes and bamboo cables reaching deep into the ground, they employed cast iron drills to reach the natural gas they used as a fuel to evaporate water from brine to produce salt. The natural gas was carried via bamboo pipes to where it was needed. There is also some evidence that the gas was used for light. While I could not find exactly when deep drilling was first used by the Europeans, I did not find any evidence prior to the early industrial revolution (mid 18th century). In the United States, the first recorded deep drill was in West Virginia in the 1820’s.

6.Ship’s RudderHan Dynasty: circa 202 BC – 220 AD

Chinese naval developments occurred far earlier than similar western technology. The first recorded use of rudder technology in the West was in 1180. Chinese pottery models of sophisticated slung axial rudders (enabling the rudder to be lifted in shallow waters) dating from the 1st century have been found. Early rudder technology (c 100 AD) also included the easier to use balanced rudder (where part of the blade was in front of the steering post), first adopted by England in 1843 – some 1700 years later. In another naval development, fenestrated rudders were common on Chinese ships by the 13th century which were not introduced to the west until 1901. Fenestration is the adding of holes to the rudder where it does not affect the steering, yet make the rudder easy to turn. This innovation finally enabled European torpedo boats to use their rudders while traveling at high speed (about 30 knots).7Harness for HorsesAge of Division; circa 220 – 581 AD

Throat harnesses have been used throughout the world to harness horses to carts and sleds. These harnesses press back on the neck of the horse thus limiting the full strength of the animal. In the late feudal period (4th Century BC) there is pictorial evidence (from the Chinese state of Chu) of a horse with a wooden chest yoke. By the late Han Dynasty the yoke was made from softer straps and was used throughout the country. By the 5Th century, the horse collar (pictured above), which allows the horse to push with its shoulders, was developed. This critical invention was introduced into Europe approximately by 970 and became widespread within 200 years. Because of the greater speed of horses over oxen, as well as greater endurance, agricultural output throughout Europe increased significantly.

8.PorcelainSui Dynasty: 581 – 618 ADPorcelain is a very specific kind of ceramic produced by the extreme temperatures of a kiln. The materials fuse and form a glass and mineral compound known for its strength, translucence and beauty. Invented during the Sui Dynasty (but possibly earlier) and perfected during the Tang Dynasty (618-906), most notably by Tao-Yue (c. 608 – c. 676), Chinese porcelain was highly prized throughout the world. The porcelain of Tao-Yue used a ‘white clay’ that was found on the edge of the Yangtze River, where he lived. By the time of the Sung Dynasty (960-1279) the art of porcelain had reached its peak. In 1708 the German Physicist Tschirnhausen invented European porcelain, thus ending the Chinese monopoly. The picture above is a teabowl with black glaze and leaf pattern from the Southern Sung Dynasty (1127-1279).

9.Toilet PaperSui Dynasty: 581 – 618 AD

As noted above, paper was an early invention of China. One of the first recorded accounts of using hygienic paper was during the Sui Dynasty in 589. In 851 an Arab traveler reported (with some amazement) that the Chinese used paper in place of water to cleanse themselves. By the late 1300’s, approximately 720,000 sheets per year was produced in packages of 1,000 to 10,000 sheets. In colonial times in America (late 1700’s) it was still common to use corn-cobs or leaves. Commercial toilet paper was not introduced until the 1857 and at least one early advertiser noted that their product was ‘splinter free’ – something quite far from today’s ‘ultra-soft’. One rather odd piece of trivia I picked up during my research is that the Romans used a sponge tied to the end of a stick – which may have been the origin of the expression “to grab the wrong end of the stick”.

10.Printing – movable typeSong Dynasty: 960 – 1279 AD

That paper was invented by the Chinese is well known (by Cai Lun c 50-121 AD), and it is one of the great Chinese inventions. The recipe for this paper still exists and can be followed by today’s artisans. In 868 the first printed book, using full page woodcuts, was produced. About 100 years later the innovations of Bi Sheng, pictured above, (990-1051) were described. Using clay fired characters he made re-usable type and developed typesetting techniques. Though used successfully to produce books, his technology was not perfected until 1298. By contrast, Gutenberg’s bibles – the first European book printed with movable type – were printed in the 1450’s. Interestingly, the Chinese did not start using metal type until the 1490’s.

The ancient Greek playwright died around 500 BC when an eagle dropped a tortoise on his noggin. Apparently, the eagle mistook the playwright’s bald head for a rock.2. Attila the Hun

On his wedding night, he got so drunk he didn’t realize that his nose was bleeding profusely. Mrs. Hun awoke the next morning to find the groom dead, drowned in his own blood.

3. Sir Francis Bacon

To see if snow would preserve meat, the 17th century philosopher / statesman / scientist killed a chicken and then spent hours trying to stuff the carcass full of snow. When it was all over, there were 2 bodies in the snow.

4. Tycho Brahe

In 16th century Denmark, it was considered rude to leave a banquet table before the meal had ended. The heavy drinking astronomer suffered in polite agony rather than excuse himself to heed the call of nature. As a result, his bladder burst and he died a slow and painful death.

5. Jim Fixx

The author of the late seventies bestseller The Complete Book of Running touted running and a healthy diet as the key to longevity. He died from a heart attack while jogging. An autopsy revealed massive blockage in three coronary arteries.

6. Holy Roman Emperor Frederick I

Clanking through the desert of the Holy Land in heavy armor, 12th century Holy Roman Emperor Frederick was so happy when he reached the Saleph River, he jumped in to quench his thirst. Unfortunately, he forgot to take his armor off and therefore sank to the bottom like an anvil.

7. Jean Baptiste Lully

During a rehearsal of his latest composition, the 17th century composer got so excited he accidentally thrust his conductor’s baton deep into his right foot. As a result, Lully subsequently died of blood poisoning.8. Pope Johann XII

Only 18 years old when he died in AD 963, Pope Johann XII was knocking at the pearly gates after his lover’s enraged husband beat him to death.

9. Jerome Irving Rodale

The founder of the organic food movement and the publisher of the Rodale Press told interviewer Dick Cavett in 1971 that he’d live to 100. Moments later, the 72 year old Rodale slumped dead in his chair from a heart attack. This episode of The Dick Cavett Show was never broadcast.

10. Tennessee Williams

Years of alcohol and drug abuse took a fatal toll on the noted playwright, who choked to death on an aspirin cap while inebriated in 1983.

First of all, just so you know, it is true that adult elephants can’t jump - if by jumping we mean the state of having no feet on the ground at the same time after propelling oneself from a stationary position. But contrary to the popular myth that it is is the only mammal that can’t, it is joined by a few others. Firstly, the sloth is unable to jump which suits its lazy lifestyle rather well. Also, rhinoceroses and hippopotamuses also cannot jump, though unlike elephants, when they run it is possible for them to have all four feet off the ground.

The Fruit eaten by Adam and Eve in the Garden of Eden was an apple

Nowhere in the Bible is the fruit eaten by Adam and Eve in the Garden of Eden referred to as an apple. The fruit is called the “fruit of the tree” (that is, the Tree of Knowledge of Good and Evil), and neither the fruit nor the tree is identified by species. In Middle English, as late as the 17th century “apple” was a generic term for all fruit other than berries but including nutsHowever, in continental European art from that period representing the Fall of Man the fruit is often depicted as an apple. The apple myth comes from a Latin word likeness: Latin malus = “bad”, malum = “an evil”, malus = “apple tree” and “mast of a ship”, malum = “apple (fruit)”.

You can extend your penis or widen its girth with special devices or medications

This is patently untrue and the source of millions of spam emails sent around the world every day. Vacuum pumps, pills, stretching techniques: none of them make one iota of difference to the size of your manhood (and consequently the engine size of your car). The only way to enlarge your penis is to have enhancement surgery. This is, obviously, extremely expensive, extremely painful, and extremely gruesome

Jihad is an “Islamic war on the western world”

Jihad is not an “Islamic war on the western world” but rather a verb meaning to struggle or to strive. One can have an internal jihad, family jihad, or religious jihad, which may or may not include violence towards non-MuslimsA comparison may be made with the term “crusade”, which is sometimes considered by Muslims to mean Western violence against Islam, when it is more often used as a metaphorical struggle; for example, “a crusade against drugs”.

Goldfish have a memory of only three seconds

The notion that goldfish have a memory of only three seconds is completely falseThey have been trained to navigate mazes and can recognize their owners after an exposure of a few months

Abraham Lincoln’s Emancipation Proclamation freed the slaves

In fact, it freed little or no slaves. Why? Because the emancipation proclamation - 1862 - declared the freedom of all slaves in the confederate states - that is, the states over which Lincoln and the Union government had no control. Furthermore, it did not free slaves from any of the states that were already under union control. This would be like Australia trying to declare a law binding on New Zealanders, when they are two separate nations. The emancipation proclamation was, effectively, worthless. It was not until the Thirteenth Amendment, December 6, 1865, that slavery was officially abolished in full.

Abraham Lincoln’s Emancipation Proclamation freed the slaves

In fact, it freed little or no slaves. Why? Because the emancipation proclamation - 1862 - declared the freedom of all slaves in the confederate states - that is, the states over which Lincoln and the Union government had no control. Furthermore, it did not free slaves from any of the states that were already under union control. This would be like Australia trying to declare a law binding on New Zealanders, when they are two separate nations. The emancipation proclamation was, effectively, worthless. It was not until the Thirteenth Amendment, December 6, 1865, that slavery was officially abolished in full.

Sugar cause hyperactivity in children

Sugar does not cause hyperactivity in children Double blind trials have shown no difference in behavior between children given sugar full or sugar-free diets, even in studies specifically looking at children with attention-deficit/hyperactivity disorder or those considered “sensitive” to sugar. In fact, it was found that the difference in the children’s behavior was all in the parents’ minds

For More "http://worldmysteries9.blogspot.com/2009/04/10-most-popular-myths-busted.html"--->Click Me

Susan Boyle (born April 1961) is a Scottish singer and church volunteer who came to public attention on 11 April 2009, when she appeared as a contestant on the third series of Britain's Got Talent Boyle found fame when she sang "I Dreamed a Dream" from Les Misérables in the competition's first round The juxtaposition of the reception to her voice with the audience's first impression of her triggered global interest. Articles about her appeared in newspapers all over the world, while the numbers who watched videos of her audition set an online record.By 20 April 2009, a mere 9 days after her televised debut, viral videos of her audition, subsequent interviews of her, and her 1999 rendition of "Cry Me a River" had been viewed over 100 million times on the Internet. Cowell is reported to be setting up a contract with Boyle with his Syco Music company label, a subsidiary of Sony Music

BiographyPersonal lifeBoyle was born in Blackburn, West Lothian, Scotland to Patrick Boyle, a storeman at the British Leyland factory in Bathgate, and Bridget Boyle, a shorthand typist;her parents were Irish immigrants. The youngest in a family of four brothers and six sisters, of whom only six survive, Boyle was born when her mother was 47.The Sunday Times writes that it was a difficult birth, during which Boyle was briefly deprived of oxygen. She was diagnosed as having learning difficulties, which led to bullying. She was labelled "Susie Simple" at school but quickly learned to overcome those who derided her.After leaving school with few qualifications, she was employed for the only time in her life as a trainee cook in the kitchen of West Lothian College for six months, and took part in government training schemes She would visit the theatre from time to time to listen to professional singers and performed at a number of local venues She took singing lessons from a voice coach, Fred O'Neil. In 1995, she auditioned for Michael Barrymore's My Kind of People,which was looking for contestants at the Braehead Shopping Centre in Glasgow, but she said she was too nervous to make a good impression. The Guardian reports that she attended Edinburgh Acting School, and has taken part in the Edinburgh Fringe. In 1999 she recorded "Cry Me a River" for a charity CD funded by the local council to commemorate the Millennium. O'Neil has said Boyle abandoned an audition for The X Factor because she believed people were being chosen for their looks, and that she almost abandoned her plan to enter Britain's Got Talent. O'Neil told The Scotsman: "I remember a phone call late last year when she said she was too old and that it was a young person's game". O'Neil persuaded her to go to the audition.Boyle's father died in the 1990s, and her siblings had left home, leaving Boyle to look after her ageing mother, who died in 2007 at the age of 91.Boyle still lives in the family home, a four-bedroom council house, with her ten-year-old cat, Pebbles. Boyle's devotion to caring for her mother was such that she did not have any time for herself.One neighbour reported that Boyle struggled to cope with the loss of her mother, stating that she "wouldn't come out for three or four days or answer the door or phone". Her mother had always encouraged her to enter local singing competitions, which she won several times, and tried to persuade her daughter to enter Britain's Got Talent, urging her to take the risk of singing in front of an audience larger than her parish church. Boyle has said she did not feel ready to do it until after her mother's death, saying that it was that event which propelled her to go on Britain's Got Talent and seek a musical career as her way of paying a tribute to her mother. Her performance on the show was the first time she had sung since thenAt the time of her Britain's Got Talent audition, Boyle was unemployed, yet active as a volunteer with the Roman Catholic church of Our Lady of Lourdes in Blackburn.She has never married; and during an interview just before she sang on the talent show, she said she had also "never been kissed" but later added, "Oh, I was just joking around. It was just banter and it has been blown way out of proportion."

Television performanceIn August 2008, when Boyle became aware that Britain's Got Talent would be holding auditions, she applied and, after the preliminary audition in October, was accepted for the taped audition, which took place in Glasgow on January 21, 2009. Boyle performed a rendition of "I Dreamed a Dream" from Les Misérables in the first round of the third series of Britain's Got Talent, which aired on April 11 and was watched by an average of 10.3 million viewers.Boyle is well aware that the audience on Britain's Got Talent was initially hostile to her because of her appearance, but she has refused to change her image:“ I know what they were thinking, but why should it matter as long as I can sing? It’s not a beauty contest. ”—Susan Boyle, The Sunday Times

Monday, April 6, 2009

Microsoft Surface (, is a multi-touch product from Microsoft which is developed as a software and hardware combination technology that allows a user, or multiple users, to manipulate digital content by the use of natural motions, hand gestures, or physical objects. It was announced on May 29, 2007 at D5 conference. Initial customers will be in the hospitality businesses, such as restaurants, hotels, retail, public entertainment venues and the military for tactical overviews. The preliminary launch was on April 17, 2008, when Surface became available for customer use in AT&T stores.The Surface is also being used in the CBS series CSI: Miami, where the crime lab uses it for investigation purposes; the MSNBC coverage of the 2008 US presidential electionDisneyland’s future home exhibits; and various hotels and casinos. As of March 2009, Microsoft had 120 partners in 11 countries that are developing applications for Surface's interface.

Unlike its predecessor, Windows 7 is intended to be an incremental upgrade to the Windows line, with the goal of being compatible with applications and hardware with which Windows Vista is already compatible.Presentations given by the company in 2008 have focused on multi-touch support, a redesigned Windows Shell with a new taskbar, a home networking system called HomeGroup, and performance improvements. Some applications that have been included with prior releases of Microsoft Windows, most notably Windows Movie Maker and Windows Photo Gallery, will not be included in Windows 7, but will instead be offered separately as part of the freewareWindows Live Essentials suite

Fast & Furious (also known as Fast & Furious 4 in other countries) is the fourth film in The Fast and the Furious film series. It is an interquel set between the second and third films (though many viewers have argued that this film is a direct sequel to the first film and does away with the second altogether). The film was released in the United States on April 3, 2009. The plot connects with the original film of the series from which Vin Diesel, Paul Walker, Michelle Rodriguez, and Jordana Brewster reprise their rolesPlotAfter a successful run at hijacking fuel tanks on the highways of the Dominican Republic, Dominic Toretto leaves his girlfriend Letty and his gang, as he is now an international criminal. One day, in Panama, Dominic receives a phone call from his sister Mia, who tells him that Letty was just murdered. Dominic returns to Los Angeles, California, to find out who murdered Letty. After Letty's funeral, Dominic asks his sister to take him to the site where Letty's accident occurred. At the scene, Dom finds traces of residue that can only be purchased at one body shop in the city. At the body shop, he finds one of his old racing counterparts that, after being coerced, leads him to a man named David Park. Dominic finds Park and hangs him out of a window threatening to drop him and vowing to kill anyone that stands in his way of avenging Letty. He receives that the information that only through a street race, arranged by Ramon Campos, can he gain access to the man responsible for Letty's death.Meanwhile, Brian O'Connor—now an FBI agent, is assigned to track down a notorious drug lord named Arturo Braga. Brian, after chasing down a criminal on foot, receives information also leading to David Park. Both Dominic and Brian, having received the same information are led to the underground entrance race that guarantees them a spot on the team that traffics heroin across the United States-Mexico border. During the race, Dominic and Brian outlast all of their competitors until the two of them remain and head towards the finish line neck and neck, Dominic sideswipes Brian's car ensuring that he comes in first, securing his spot on the team so that he can seek justice on Letty's behalf. Having lost the race, Brian uses his influence at the FBI to ensure that one of the other members on Braga's team gets arrested for "intent to distribute methamphetamine," in order to usurp his spot of the team. At a party, Ramon Campos, Braga's right hand man, welcomes them to the team and gives them a GPS that will alert them to where they will begin their race. Dominic ends up in a confrontation with a racer identified as Fenix, the driver of the car that collided with Letty before firing the shot that killed her.Dominic and Brian both receive the coordinates to meet with Campos and are transported, along with their cars by Semi-trailer to the Mexican border to receive the heroin that they are to transport, from there they are to follow Fenix's lead to the other side through an underground tunnel so they aren't seen by the satellite images and forward looking infrared used to monitor the borders. Once on the other side it is realized that the drivers are thought of as disposable and that after successful trafficking of the product they are shot and killed in order to avoid paying them. Letty, having been in the same situation was the only driver to get away when they attempted to shoot her, it was the pursuit that led to her death. Dom, anticipating this, has set his car to explode by combining the nitrous oxide with spark from the cigarette lighter in his car after he learns from Fenix that he was responsible for killing Letty with no remorse. Brian hijacks one of the Hummers carrying the heroin and he and Dominic escape the gunfire and head back to the U.S. where Brian speaks to his superiors about a plan that he has devised to trade the heroin for Braga if they will exhonerate Dominic.An exchange is arranged with Campos, 6 million dollars for the heroin, provided that Braga be the one to deliver the money personally. The FBI is poised to arrest Braga at the exchange site, however, Dominic and Brian both realize that Campos is in fact Braga before the FBI does and the raid is botched. Braga evades capture and flees over the Mexican border out of the FBI's jurisdiction. Brian and Dominic head after him on their own and find him in a cathedral praying for salvation. They kidnap Braga with intent to take him back to the United States where he can be tried and imprisoned for drug trafficking, but after having taken him captive they are chased by Braga's henchmen. The chase leads to the same underground tunnels that they went through in order to transport the drugs into the United States. Once on the United States side of the border, Dominic kills Fenix by crushing him with his car and Braga is finally apprehended by the FBI, as is Dominic.Dominic is tried for his crimes and, though Brian appealed to the courts on his behalf, is sentenced to "25 years to life without the possibility of early parole." The movie ends with Brian, Mia, and the two remaining members of Dominic's gang racing towards the prison bus transporting Dom to the penetentiary with the intent to break him out.Main castVin Diesel as Dominic "Dom" TorettoPaul Walker as Brian O'ConnorMichelle Rodriguez as Leticia "Letty" OrtizJordana Brewster as Mia TorettoJohn Ortiz as Ramon Campos/Arturo BragaLaz Alonso as Fenix RiseGal Gadot as Gisele HaraboJack Conley as PenningSung Kang as HanDon Omar as RicoTego Calderon as Tego

Friday, April 3, 2009

Yaavarum Nalam - Hale and healthyThriller or horror movies are a rarity in Tamil cinema. Even the little made are loaded with Computer Graphic generated visuals far from convincing the audience. Filling the void is 'Yaavarum Nalam’. All credit to director Vikram Kumar, who has come out an engrossing thriller in the lines of classic horrors by Alfred Hitchcock. An engrossing screenplay with no lagging moments bringing the audience to their seat-edges sums up 'Yaavarum Nalam'.Madhavan, who the audience got accustomed watching him romancing the heroines and much recently bashing baddies, play a different role. He plays a male protagonist who strives to save his family from the hands of a super natural power. As a caring hubby and a loving son in a joint family, one can see a refreshing Madhavan. He looks dashing with his sophisticated looks. Looking at ease on screen, he is casual in his dialogue delivery and his body language. He bubbles with enthusiasm in the first half and brings out the frightened look well towards the climax.Bollywood actor Neetu Chandra makes her debut in Tamil playing a bubbly young wife of Madhavan. Though she has nothing much to do in the movie, she does full justice to her role. Saranya, who plays Madhavan’s mother come out good. She resembles women in the average household watching almost all the mega-serials that are being aired on the satellite channels. She sympathises with the character with innocence evokes applause.Manohar (Madhavan), is a civil engineer who lives in a joint family. His brother (Hari Nair) and his wife (Ameetha) and Manohar and his wife (Neetu Chandra) live happily together without any qualms. The brothers buy a flat 13 B in a huge apartment. They move to the flat with their mega-serial addict mother (Saranya). Strange things start to happen as they occupy the flat. Manohar’s image captured on his mobile appears distorted. The lift doesn’t work when Manohar steps in. But he gets more shock when he watches a mega-serial ‘Yaavarum Nalam’ on a private satellite channel. Whatever things that unfolds in the serial starts to happen in his real life. This hocks him. He comes across Dr Balu (Sachin Khanderkar), who speaks about paranormal things.A curious Manohar sets out to find the mystery behind the mega-serial’s story but is shocked to know that it was available only in his house. He with the help of a cop Shiva (Ravi Babu) begins research. The mystery gets unfolded. The sequences in the mega-serial are nothing but real-life incidents that happened three decades ago. The spirits of those who perished in a murder are back to avenge the real-killers. Did Manohar save his family from the spirits and who the real culprit gets unfolded in a riveting climax.P C Sreeram’s cinematography adds pep to the screenplay. Though shaky at many places, the tone and texture deserve mention. Tubbi Parik’s background score is good bringing audience to their seat-edges. Neelu Ayappan’s dialogues are crisp and simple. In the flip side, one wonders when Manohar can identify events on the serial with his daily life, how his family missed it out? Otherwise, it is a movie that is refreshingly different.

Physically, the video card is 10.5" in length, requires two 6-pin power connectors, and sports a dual slot heat sink. In addition, it uses a PCI Express 2.0 x16 interface while providing two DVI outputs.The GTX 275 is set to battle the HD 4890 and, according to NVIDIA, claims a 10-35% performance edge over ATI's offering in various benchmarks and tests. As more reviews and comparisons are published, we'll find out how accurate that statement is. For now, you will have to wait a couple of weeks to purchase this product. Expect wide availability by April 14, 2009 at a price of $249

The days of getting something for nothing on the Net could be dwindling. More and more companies are rethinking their no-cost approaches and introducing charges for the online services that users have come to rely on.The shift may not be a total surprise, given the economy's effect on the tech industry, but that doesn't mean longtime customers suddenly confronted with new terms are any less unsettled. The free-to-fee trend is rapidly gaining momentum--and odds are, it's only getting started.Here are seven services taking the plunge and requiring you to cough up cash to keep enjoying their perks.1. Kodak GalleryKodak has announced that it's shifting to a fee-based model for its Kodak Gallery photo-sharing service (formerly known as Ofoto). Customers now need to spend an annual minimum on Kodak-offered products, or face having their photos deleted."We have 5 billion photos that we're storing," says Mark Cook, Kodak's director of product management. "We can support some of that, but it's hard to support all of it."The spending minimum varies based on how much space you're using: For 2GB or less, you'll have to buy $5 worth of stuff each year to keep your account. If your photos take up more than 2GB, your annual spending requirement jumps to $20. The updated system is already in place for new users. Customers who had accounts before the announcement have until mid-May to meet their minimums or see their photos fade into oblivion."If you look at folks that are consuming lots of storage without spending anything, that ends up costing us a lot of money--money we really can't put into developing new output services," Cook says. "In the long run, you end up with companies that are giving things away for free and companies that have business models."2. Last.fmOnline radio site Last.fm sparked a minor revolt (200+ pages of comments prior to the post's being locked down) when it announced last week that many of its users would have to start paying to play. Anyone listening to Last.fm outside of the United States, the United Kingdom, or Germany would have to pony up €3 a month to keep the music going."We simply can't be in every country where our radio service is available selling the ads we need to support the service," founder Richard Jones explains.The outrage led Last.fm to delay its decision, but you can be certain that the free ride is ending. It may just be another few weeks until the switch happens.3. LetsCallMeWeb startup LetsCallMe got plenty of coverage when it launched its free anonymous-calling service last September. The service allows you to set up a page where anyone can call you without ever seeing your number--perfect for people who deal in e-commerce but who don't necessarily want to post their digits publicly.Last month, though, LetsCallMe relaunched. Users found their pages converted to sign-up portals, and--without warning--the free service was gone.4. NewsdayCablevision Systems' Newsday is just one of the publications converting their online editions into subscription-based services."We plan to end the distribution of free Web content and make our news-gathering capabilities a service for our customers," Cablevision COO Tom Rutledge told Reuters.The idea of charging for Web content is not new: The Wall Street Journal charges for much of its online material, and other newspaper publishers are thinking about following suit. Considering the struggles of the entire publishing industry, you can't blame the paper for experimenting with a new revenue model--warranted or not, however, it's still another hit on your wallet.5. NetflixDabbling in high-def discs doesn't come free for Netflix subscribers anymore. The online movie service started charging a dollar a month for access to Blu-ray titles last fall. Then, just this week, it announced it was raising that rate by anywhere from $1 to $8, depending on your specific subscription plan. The company cited increased usage of Blu-ray discs for the change.6. GabcastThe start of March marked the end of free service for phone-recording site Gabcast. The site's previously no-cost phone-to-MP3 option jumped to 10 cents a minute, as its staff had announced a few days before. The service, designed to create audio files for podcasts or audio blogs, still offers a free VoIP recording option--but if you want to phone in, you'll have to pay up now.7. BrightcoveVideo-sharing service Brightcove switched off its free service just before the first of the year. The site had allowed users to upload video into an ad-supported platform, but the business model didn't prove worthwhile."Although more than 40,000 publishers have signed up for the network, it represents less than 1 percent of our revenue," spokesperson Josh Hawkins wrote in a blog posting. "Our core business, the Brightcove platform, has been extremely successful for us and for our customers, so we've decided to focus 100 percent of our business efforts on the...platform...customers pay us to use."Users with clips on Brightcove's site received the option to pay for a "low-cost edition" of the service's premium platform. Judging by the comments on the official announcement, though, most people didn't regard the decision as being too bright of a move.What's NextAlready, numerous other free-to-fee transitions are in the works. Both People.com and Time.com are said to be mulling over subscription-based systems, and a bevy of newspapers may soon do the same. Twitter is toying with the notion of "premium" accounts for corporate users. Even the cable TV industry is tossing around the idea of charging customers for viewing shows online, according to a report published in the New York Times this week."Consumers are consuming more content in greater numbers than ever before, but the ability [to] effectively monetize the growth in audience size and engagement has not been keeping pace," theorizes Mark Mulligan, research director of Forrester.A weak ad market, Mulligan says, only adds to the problem. Factor in licensing fees within services offering copyrighted content, and you have a sticky situation."Content owners see all of the growing consumer usage and expect to see appropriate increased compensation, but the sites themselves are often not seeing their ad revenues go up accordingly," Mulligan says.You can anticipate, then, seeing more freebies say "fee, please" as businesses look for ways to stay afloat. We may not always like it, but in many cases paying for a service is better than losing the service altogether. After all, someone has to do the work, and those people have to get a few shekels for their efforts.On that note, now that you've read this story, you owe me $4. Checks or money orders accepted. Cookies also considered.

A cyber spy network operated from China hacked into classified documents on government and private computers in 103 countries, internet researchers have revealed.The spy system, which investigators dubbed GhostNet, compromised 1,295 machines at Nato and foreign affairs ministries, embassies, banks and news organisations across the world, as well as computers used by the Dalai Lama and Tibetan exiles.The work of Information Warfare Monitor (IWM) investigators focused initially on allegations of Chinese cyber espionage against the Tibetan exile community but led to a much wider network of compromised machines.IWM said that, while its analysis pointed to China as the main source of the network, it had not been able conclusively to identify the hackers. The IWM is composed of researchers from an Ottawa-based think tank, SecDev Group, and the University of Toronto's Munk Centre for International Studies.The researchers found that more than 1,295 computers had been affected at the ministries of foreign affairs of Iran, Bangladesh, Latvia, Indonesia, Philippines, Brunei, Barbados and Bhutan. They also discovered hacked systems in the embassies of India, South Korea, Indonesia, Romania, Cyprus, Malta, Thailand, Taiwan, Portugal, Germany and Pakistan.The remote spying operation is thought to be the most extensive yet uncovered in the political world and is estimated to be invading more than a dozen new computers a week. Other infected computers were found at Deloitte & Touche in New York.The IWM report said: "GhostNet represents a network of compromised computers resident in high-value political, economic, and media locations spread across numerous countries worldwide. At the time of writing, these organisations are almost certainly oblivious to the compromised situation in which they find themselves. The computers of diplomats, military attachés, private assistants, secretaries to Prime Ministers, journalists and others are under the concealed control of unknown assailant(s)."It added: "In Dharamsala [the headquarters of the Tibetan government in exile] and elsewhere, we have witnessed machines being profiled and sensitive documents being removed. At our laboratory, we have analysed our own infected 'honey pot' computer and discovered that the capabilities of GhostNet are potent and wide-ranging."Almost certainly, documents are being removed without the targets’ knowledge, keystrokes logged, web cameras are being silently triggered, and audio inputs surreptitiously activated."Once the hackers infiltrated the systems, they gained control using malware – software they had installed on the compromised computers – and sent and received data from them, the researchers said. The investigation concluded that Tibetan computer systems were compromised by multiple infections that gave attackers unprecedented access to potentially sensitive information, including documents from the private office of the Dalai Lama.The investigators went to India, Europe and North America to collect evidence about the infected systems used by Tibetan exiles. It was in the second stage of the inquiry, when they were analysing the data, that they uncovered the network of compromised computers.The IWM report said in its summary: "The GhostNet system directs infected computers to download a Trojan known as Ghost Rat that allows attackers to gain complete, real-time control. These instances of Ghost Rat are consistently controlled from commercial internet access accounts located on the island of Hainan, in the People’s Republic of China."

Incorporating the use of secure pen drives in companies is necessary to prevent attacks on flash drives and operating systems. The software developed to do this is called anti-malware. Anti-malware software used in a secure pen drive can make viruses ineffective, rendering them useless and unable to corrupt or destroy important data. McAfee a global security company has developed the software used in SanDisk’s secure pen drive. The anti-malware scans for viruses to flash drives and operating systems. The anti-malware software removes the threat to the pen drive data before it has an opportunity to corrupt data or before it is uploaded into the host operating system.Front End Pen Drive SecurityThe need to utilize a secure pen drive which has front and back end strength should concern every entity that needs to keep data secure. If data is going to be kept secure then it needs to have a strong password program for obvious reasons. A secure pen drive should have a strong authentication process to protect confidential information from being exploited by unauthorized users. Using strong passwords will maintain a strong front end defense keeping data out of the reach of thieves. The secure pen drive manufactured by SanDisk Enterprise utilizes an 8 character password authentication and this makes hacking passwords almost impossible.A pen drive that is managed through a central control program adds an enhancement to system security. Drives can be monitored or terminated from a central control server if they become lost or stolen. If no such central control program for a pen drive is in place the threat to its data remains high. This can be attributed to the fact that there is no central access and control program in place coupled with the fact that drives are not secure. Without a pen drive being secure the only way to safeguard the data and operating system is exert physical security measures by putting a ban on the use of all flash drives in the system.

Pen Drive EncryptionA system that is uses a pen drive where the data is not encrypted is vulnerable to data theft. Flash drives where the data is not encrypted are vulnerable as soon as it falls into a thief’s possession. AES algorithm encryption used with a secure pen drive prevents data from being stolen and exploited by those unauthorized to access it. A security solution for companies is to use a secure pen drive produced by SanDisk Enterprise. The drive they offer uses the advanced AES 256-bit encryption. If a pen drive is stolen by a thief even if the authentication process is by passed the data will be unreadable and unusable.The pen drive is very popular today and using drives that are secure is not an option for those desiring to keep their data confidential and safe. While a secure pen drives has made data more mobile and accessible then ever before it has made data a target for those who would steal it for the purposes of exploitation. A secure pen drive with a strong authentication process, data encryption and central control will make theft virtually impossible for those intending on gaining possession of confidential data

The tag line of the film says it is- A different love story. AGAIN! Simbu and Gautham are not willing to comment on the tagline but promises that they will speak about it at a later stage. Now we will have to be contended with the teaser ads.

Silambarsan bags a top director and a big project!February 09, 2009Those who keep a tab on the Tamil dailies would have had a glimpse of the announcement of Silambarasan's Vinnai Thaandi Varuvaaya, taglined …a different love story again. The advert, however, did not carry any details other than the name of the producers – Escape Artists Motion Pictures and RS Infotainment Private Ltd. This has been a deliberate move from the production team to increase the curiosity among the fans. Based on the classified information made available to Behindwoods from sources close to Silambarasan and the yet to beannounced director of the movie, the first look poster will be released on Friday, February 13, 2009. With an official announcement, the movie will go on floors coming Friday, a day short to Valentine's Day. Big names in the industry are involved in the project. Although Behindwoods has details on the same, we decide not to spoil the fun for the fans. Which precisely means, Silambarasan fans would have to wait with bated breath until Friday for the official announcement.But one thing is for sure. The director is one of the hottest in the trade; music is by the best of the best and the heroine, one of the leading ladies of Kollywood.Ahem Ahem!

What is the G-20The Group of Twenty (G-20) Finance Ministers and Central Bank Governors was established in 1999 to bring together systemically important industrialized and developing economies to discuss key issues in the global economy. The inaugural meeting of the G-20 took place in Berlin, on December 1516, 1999, hosted by German and Canadian finance ministers.MandateThe G-20 is an informal forum that promotes open and constructive discussion between industrial and emerging-market countries on key issues related to global economic stability. By contributing to the strengthening of the international financial architecture and providing opportunities for dialogue on national policies, international co-operation, and international financial institutions, the G-20 helps to support growth and development across the globe.OriginsThe G-20 was created as a response both to the financial crises of the late 1990s and to a growing recognition that key emerging-market countries were not adequately included in the core of global economic discussion and governance. Prior to the G-20 creation, similar groupings to promote dialogue and analysis had been established at the initiative of the G-7. The G-22 met at Washington D.C. in April and October 1998. Its aim was to involve non-G-7 countries in the resolution of global aspects of the financial crisis then affecting emerging-market countries. Two subsequent meetings comprising a larger group of participants (G-33) held in March and April 1999 discussed reforms of the global economy and the international financial system. The proposals made by the G-22 and the G-33 to reduce the world economy's susceptibility to crises showed the potential benefits of a regular international consultative forum embracing the emerging-market countries. Such a regular dialogue with a constant set of partners was institutionalized by the creation of the G-20 in 1999.MembershipThe G-20 is made up of the finance ministers and central bank governors of 19 countries: Argentina, Australia, Brazil, Canada, China, France, Germany, India, Indonesia, Italy, Japan, Mexico, Russia, Saudi Arabia, South Africa, South Korea, Turkey, the United Kingdom and the United States of America, and also the European Union who is represented by the rotating Council presidency and the European Central Bank. To ensure global economic fora and institutions work together, the Managing Director of the International Monetary Fund (IMF) and the President of the World Bank, plus the chairs of the International Monetary and Financial Committee and Development Committee of the IMF and World Bank, also participate in G-20 meetings on an ex-officio basis. The G-20 thus brings together important industrial and emerging-market countries from all regions of the world. Together, member countries represent around 90 per cent of global gross national product, 80 per cent of world trade (including EU intra-trade) as well as two-thirds of the world's population. The G-20's economic weight and broad membership gives it a high degree of legitimacy and influence over the management of the global economy and financial system.AchievementsThe G-20 has progressed a range of issues since 1999, including agreement about policies for growth, reducing abuse of the financial system, dealing with financial crises and combating terrorist financing. The G-20 also aims to foster the adoption of internationally recognized standards through the example set by its members in areas such as the transparency of fiscal policy and combating money laundering and the financing of terrorism. In 2004, G-20 countries committed to new higher standards of transparency and exchange of information on tax matters. This aims to combat abuses of the financial system and illicit activities including tax evasion. The G-20 also plays a signficant role in matters concerned with the reform of the international financial architecture.The G-20 has also aimed to develop a common view among members on issues related to further development of the global economic and financial system and held an extraordinary meeting in the margins of the 2008 IMF and World Bank annual meetings in recognition of the current economic situation. At this meeting, in accordance with the G-20s core mission to promote open and constructive exchanges between advanced and emerging-market countries on key issues related to global economic stability and growth, the Ministers and Governors discussed the present financial market crisis and its implications for the world economy. They stressed their resolve to work together to overcome the financial turmoil and to deepen cooperation to improve the regulation, supervision and the overall functioning of the worlds financial markets.ChairUnlike international institutions such as the Organization for Economic Co-operation and Development (OECD), IMF or World Bank, the G-20 (like the G-7) has no permanent staff of its own. The G-20 chair rotates between members, and is selected from a different regional grouping of countries each year. In 2009 the G-20 chair is the United Kingdom, and in 2010 it will be South Korea. The chair is part of a revolving three-member management Troika of past, present and future chairs. The incumbent chair establishes a temporary secretariat for the duration of its term, which coordinates the group's work and organizes its meetings. The role of the Troika is to ensure continuity in the G-20's work and management across host years.Former G-20 Chairs1999-2001 Canada2002 India2003 Mexico2004 Germany2005 China2006 Australia2007 South Africa2008 BrazilMeetings and activitiesIt is normal practice for the G-20 finance ministers and central bank governors to meet once a year. The last meeting of ministers and governors was held in São Paulo, Brazil on 8-9 November 2008. The ministers' and governors' meeting is usually preceded by two deputies' meetings and extensive technical work. This technical work takes the form of workshops, reports and case studies on specific subjects, that aim to provide ministers and governors with contemporary analysis and insights, to better inform their consideration of policy challenges and options.Towards the end of 2008 Leaders of the G-20 Countries meet in Washington. See the Declaration and action plan from the Washington Summit (PDF 72KB) . This meeting remitted follow up work to Finance Ministers. In addition to their November meeting in order to take forward this work in advance of the Leaders summit in London on 2nd April Finance Ministers and Central Bank Governors will also meet in March 2009. A deputies meeting will be held in February 2009 to prepare for the Ministers meeting.G-20 EventsDeputies Meeting 1st February 2009Officials Workshop Financing for Climate Change 13th & 14th February 2009Deputies Meeting 13th March 2009Finance Ministers and Central Bank Governors Meeting 14th March 2009Officials Workshop on Global Economy 25th 26th May 2009Officials Workshop on Sustainable Financing for Development June 2009Deputies Meeting September 2009Finance Ministers and Central Bank Governors Meeting 7th & 8th November 2009Interaction with other international organizationsThe G-20 cooperates closely with various other major international organizations and fora, as the potential to develop common positions on complex issues among G-20 members can add political momentum to decision-making in other bodies. The participation of the President of the World Bank, the Managing Director of the IMF and the chairs of the International Monetary and Financial Committee and the Development Committee in the G-20 meetings ensures that the G-20 process is well integrated with the activities of the Bretton Woods Institutions. The G-20 also works with, and encourages, other international groups and organizations, such as the Financial Stability Forum, in progressing international and domestic economic policy reforms. In addition, experts from private-sector institutions and non-government organisations are invited to G-20 meetings on an ad hoc basis in order to exploit synergies in analyzing selected topics and avoid overlap.External communicationThe country currently chairing the G-20 posts details of the group's meetings and work program on a dedicated website. Although participation in the meetings is reserved for members, the public is informed about what was discussed and agreed immediately after the meeting of ministers and governors has ended. After each meeting of ministers and governors, the G-20 publishes a communiqué which records the agreements reached and measures outlined. Material on the forward work program is also made public.